Progress in Cryptology -- INDOCRYPT 2003
Editat de Thomas Johansson, Subhamoy Maitraen Limba Engleză Paperback – 25 noi 2003
Preț: 328.72 lei
Preț vechi: 410.90 lei
-20% Nou
Puncte Express: 493
Preț estimativ în valută:
58.17€ • 67.84$ • 51.07£
58.17€ • 67.84$ • 51.07£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540206095
ISBN-10: 3540206094
Pagini: 448
Ilustrații: XII, 436 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.67 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540206094
Pagini: 448
Ilustrații: XII, 436 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.67 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talks.- Linear Complexity and Related Complexity Measures for Sequences.- Forensic Computing.- Stream Cipher.- Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation.- Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator.- Block Cipher.- Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA.- Impossible Differential Cryptanalysis for Block Cipher Structures.- Impossible Differential Attack on 30-Round SHACAL-2.- Boolean Function.- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria.- Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria.- Secrect Sharing.- On Multiplicative Linear Secret Sharing Schemes.- A New (2,n)-Visual Threshold Scheme for Color Images.- On the Power of Computational Secret Sharing.- Bilinear Pairing.- Identity-Based Broadcasting.- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.- Extending Joux’s Protocol to Multi Party Key Agreement.- Public Key.- Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups.- Prime Numbers of Diffie-Hellman Groups for IKE-MODP.- Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems.- Signature Scheme.- Security Analysis of Several Group Signature Schemes.- Forking Lemmas for Ring Signature Schemes.- Protocol.- Practical Mental Poker Without a TTP Based on Homomorphic Encryption.- Lightweight Mobile Credit-Card Payment Protocol.- Elliptic Curve & Algebraic Geometry.- On the Construction of Prime Order Elliptic Curves.- Counting Points on an Abelian Variety over a Finite Field.- Implementation & Digital Watermarking.- Side ChannelAttack on Ha-Moon’s Countermeasure of Randomized Signed Scalar Multiplication.- Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p m ).- Cryptanalysis of Block Based Spatial Domain Watermarking Schemes.- Authentication.- More Efficient Password Authenticated Key Exchange Based on RSA.- A Password-Based Authenticator: Security Proof and Applications.- Stronger Security Bounds for OMAC, TMAC, and XCBC.- Progressive Verification: The Case of Message Authentication.
Caracteristici
Includes supplementary material: sn.pub/extras